Professional Documents
Culture Documents
Design and Implementation of An Intrusion Response System
Design and Implementation of An Intrusion Response System
activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes.
such response policies are that of Policy Matching and Policy Administration.
(hackers) that try to gain access to the database by exploring the system vulnerabilities (e.g., incorrect configuration, hidden flaws on the implementation, etc).
illicit actions for their personal benefit or to harm the organization by causing loss or corruption of critical data.
Manual supervision and audit procedures are normally
the only tools the DBA can use to detect potential database intrusion.
Intrusion Response System in which previously mentioned drawbacks were overcome with new ideas like instead of giving separate privileges for DBAS, we are going to share the privilege between the DBAS.
alteration for database objects than he should get permission from other DBAS within their group, so it is an easiest way to control the privilege of DBAS.
HARDWARE SPECIFICATION Processor Hard Disk Ram Monitor Keyboard Mouse : : : : : : Dual Core 256 GB 1 GB 15 Color Monitor 104 keys Standard Keyboard Standard 3 Button Mouse
SOFTWARE SPECIFICATION Operating System Front end Back end : : : Windows XP JAVA My SQL